Flux Gitops for Kubernetes
Flux Gitops
Introduction to GitOps
Something that is in demand at the time of me writing this post is using gitops in Kubernetes. All over Youtube and other webpages automation is being emphasized. When using Kubernetes there are a few ways to facilitate pushing application updates to a cluster. The method used in this post is flux.
With flux we can make updates to yaml files in code, get a merge request approved by a fellow developer, and then merge. After the merge Flux will take care of the rest. It works by periodically polling your git repo and reconciling any changes made. In this we talk about the basics to start with: bootstrapping, Kustomizations, and HelmReleases.
Prerequisites
- kubernetes cluster
- flux cli installed
Bootstrapping / Installation
First we need to bootstrap our kubernetes cluster with flux. I use github with deploy keys, but there are many other ways bootstrap a kubernetes cluster. Feel free to bootstrap in a way that meets your needs and go to the next steps.
To bootstrap using Github we follow the instructions (here)[https://fluxcd.io/flux/installation/bootstrap/github/]. First you need a PAT on your Github account. You can find your PATs here. According to the docs when creating a new token you need to ensure it has the following permissions:
- Administration -> Access: Read and Write
- Contents -> Access: Read and write
- Metadata -> Access: Read-only
We are using Read/Write for Administration because flux will be creating its own deploy keys to separate the cluster configuration from our PATs. Save your new key and use it in the next command we run.
Now we bootstrap the cluster using flux
.
flux bootstrap github \
--token-auth=false \
--components-extra=image-reflector-controller,image-automation-controller \
--owner=youraccountname \
--repository=yourreponame \
--branch=main \
--path=path/in/repo \
--personal \
--read-write-key
Let’s break this command down so you can customize as needed.
- token-auth=false has the boostrap process create a deploy key in the repo. This means it won’t be setup using a PAT which can expire.
- components-extra is specified here because I use the auto image updater in
flux
. If you don’t know what this is, or have no plan on using it, don’t include this line. You can always rebootstrap with this later if needed with no downsides. - owner is just your username, required.
- repository is your repo name, required.
- branch is the branch name you want the cluster to watch for changes. I use main, but for a development cluster you can use another one to make it easier to test changes without affecting production.
- path is the path in the repo to watch. Some files will be created in the bootstrap process at this location.
- personal just means that your account is a personal account and not an org.
- read-write-key is used because that allows the deploy key to be read/write to your repository. This isn’t required unless you expect to need your
flux
installation to update your repo after the bootstrapping process. For me this was used for the auto image updater.
Environment Variables
Make sure to set the following environment variable before bootstrapping:
- GITHUB_TOKEN: set to your github PAT
Repository Structure
After bootstrapping the cluster you can start working out your repository. Two examples of this are the official example and my repo. Here is what my repo looks like from the top level:
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 3/17/2025 8:40 PM apps
d----- 3/22/2025 4:34 PM clusters
d----- 3/5/2025 6:54 AM infrastructure
-a---- 3/22/2025 6:42 PM 1511 README.md
From here on I reference my repository.
clusters
: For my path in the bootstrap command I useclusters/clustername
. This is where anyflux
files to deployapps
orinfrastructure
will be.apps
: Application definition files with the structureapps/app_name
.infrastructure
: Much likeapps
except for backend support likecert-manager
orexternal-dns
.
To enable an app for a cluster we useKustomization
s.
Kustomization
The flux
Kustomization
CRD is used to work like a kustomization.yaml
file. It lets flux reconcile code that it points at. An example of a Kustomization
looks like this.
apiVersion: kustomize.toolkit.fluxcd.io/v1
kind: Kustomization
metadata:
name: example
namespace: flux-system
spec:
interval: 10m
targetNamespace: default # optional
sourceRef:
kind: GitRepository
name: flux-system # the repo created by bootstrapping
path: "../../../apps/website"
prune: true # if true will delete objects once the flux objects are gone or changed. Otherwise will not delete things.
timeout: 1m
There are many ways to kustomize
the deployments pointed to by these objects. See the docs for the full list of ways to configure these. For example in my repo I like to substitute values from different clusters to reuse code.
apiVersion: kustomize.toolkit.fluxcd.io/v1
kind: Kustomization
metadata:
name: danstechjourney
namespace: flux-system
spec:
interval: 10m
sourceRef:
kind: GitRepository
name: flux-system
path: "../../../apps/danstechjourney/"
prune: true
timeout: 1m
postBuild:
substitute:
domain: danstechjourney.com
cluster_name: dev
image: 'registry-dev.martin.lan:443/danstechjourney'
image_tag: '1742644463'
Using substitution like the above example, I can reuse application code between clusters. If I want to deploy app changes from one cluster to another, I can always use branches to separate and test changes. I add this file under clusters/dev/website.yaml
which then connects the cluster to the website code for danstechjourney.
HelmRelease
HelmReleases
are used to deploy helm charts via flux
. You can specify values for the release as well just like a normal helm chart installation. To use a HelmRelease
you first need to define a HelmRepository
. For example, this is what I use for deploying vaultwarden.
apiVersion: source.toolkit.fluxcd.io/v1
kind: HelmRepository
metadata:
name: vaultwarden
namespace: vaultwarden
spec:
interval: 5m
url: https://guerzon.github.io/vaultwarden
Now we can deploy the chart via the HelmRelease
.
apiVersion: helm.toolkit.fluxcd.io/v2
kind: HelmRelease
metadata:
name: vaultwarden
namespace: vaultwarden
spec:
interval: 10m
timeout: 5m
chart:
spec:
chart: vaultwarden
version: '0.31.6'
sourceRef:
kind: HelmRepository
name: vaultwarden
interval: 5m
releaseName: vaultwarden
values:
adminToken:
existingSecret: "vaultwarden-admin"
existingSecretKey: "token"
smtp:
existingSecret: "vaultwarden-smtp"
host: smtp.gmail.com
security: "starttls"
port: 587
from: "warden@${domain}"
fromName: "warden"
username:
existingSecretKey: "username"
password:
existingSecretKey: "password"
storage:
data:
name: "vaultwarden-data"
size: "15Gi"
path: "/data"
keepPvc: false
accessMode: "ReadWriteOnce"
attachments:
name: "vaultwarden-files"
size: "100Gi"
path: /files
keepPvc: false
accessMode: "ReadWriteOnce"
domain: "https://${domain}"
invitationOrgName: "${org_name}"
ingress:
enabled: true
class: "nginx"
nginxIngressAnnotations: true
additionalAnnotations:
external-dns.alpha.kubernetes.io/hostname: "${domain}"
tls: true
hostname: "${domain}"
path: "/"
pathType: "Prefix"
tlsSecret: "warden-tls"
nginxAllowList: ""
You can specify values under spec.values
. Under spec.chart
the code that identifies the HelmRepository
and helm chart/version used.
Deployment
Once the code changes are complete, once you push changes to the target branch your cluster will pickup any differences from what it currently has and start to reconcile the differences. This can take time depending on what you set spec.interval
to. One way to force reconcile quickly is to run the flux
cli command like so:
flux -n flux-system reconcile kustomization flux-system
This will force a reconcile for flux-system. Once this is done you can force reconcile individual Kustomizations
.
flux -n flux-system reconcile kustomization appname
Troubleshooting
If your reconcile takes a while, or if the command to manually reconcile hangs for about a minute, it could be because there is a problem. To look at flux
logs you only have to look into the pods that are running in the flux-system
namespace.
PS C:\Users\dan\git\danstechjourney> kubectl -n flux-system get pods
NAME READY STATUS RESTARTS AGE
helm-controller-5fc6f89467-8fvdn 1/1 Running 0 17d
image-automation-controller-594bfbc89c-zv5gx 1/1 Running 0 8d
image-reflector-controller-6686fb64c9-z29lt 1/1 Running 0 8d
kustomize-controller-785d866cb7-v4rfr 1/1 Running 0 17d
notification-controller-56776fcb98-phqnm 1/1 Running 0 17d
source-controller-6cd558bc58-pb926 1/1 Running 0 17d
For Kustomization
objects we want to look at logs for pods prefixed with kustomize-controller
. For HelmRelease
objects we want to look at logs from pods prefixed with helm-controller
.
Closing
flux
is incredible at reconciling differences in code to kubernetes clusters. This post touched upon the basics, but there is so much more you can do with it. Feel free to check out my repo to see what I’m currently using it for. In the future I plan to have a post on auto image updates so be on the lookout for that.